A buffer overflow flaw was found in the zsh shell symbolic link resolver. A local, unprivileged user can create a specially crafted directory path which leads to a buffer overflow in the context of the user trying to do symbolic link resolution in the aforementioned path. An attacker could exploit this vulnerability to cause a denial of service condition on the target.
Find out more about CVE-2014-10072 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS3 Base Score | 5 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L |
Attack Vector | Local |
Attack Complexity | High |
Privileges Required | Low |
User Interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity Impact | Low |
Availability Impact | Low |
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (zsh) | RHSA-2018:1932 | 2018-06-19 |
Red Hat Enterprise Linux 7 (zsh) | RHSA-2018:3073 | 2018-10-30 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | zsh | Will not fix |